bcryptprimitives.dll
Description: Windows Cryptographic Primitives Library
Authors: © Microsoft Corporation. All rights reserved.
Version: 10.0.19041.5438
Architecture: 32-bit
Operating System: Windows NT
SHA256: 270b79643a27f11bf8793cc47fd12e4c
File Size: 375.5 KB
Uploaded At: Dec. 1, 2025, 7:53 a.m.
Views: 9
Exported Functions
- GetAsymmetricEncryptionInterface (Ordinal: 1, Address: 0x10930)
- GetCipherInterface (Ordinal: 2, Address: 0x2a8f0)
- GetHashInterface (Ordinal: 3, Address: 0x158a0)
- GetKeyDerivationInterface (Ordinal: 4, Address: 0x317d0)
- GetRngInterface (Ordinal: 5, Address: 0x2ae20)
- GetSecretAgreementInterface (Ordinal: 6, Address: 0x2b5f0)
- GetSignatureInterface (Ordinal: 7, Address: 0x2ac80)
- MSCryptConvertRsaPrivateBlobToFullRsaBlob (Ordinal: 8, Address: 0x2cf30)
- ProcessPrng (Ordinal: 9, Address: 0x1b430)
- ProcessPrngGuid (Ordinal: 10, Address: 0x3c8d0)
Imported DLLs & Functions
api-ms-win-core-errorhandling-l1-1-0.dll
- GetLastError (Address: 0x1005a000)
- SetLastError (Address: 0x1005a004)
api-ms-win-core-handle-l1-1-0.dll
- CloseHandle (Address: 0x1005a00c)
api-ms-win-core-io-l1-1-0.dll
- DeviceIoControl (Address: 0x1005a014)
api-ms-win-core-libraryloader-l1-2-0.dll
- DisableThreadLibraryCalls (Address: 0x1005a024)
- GetModuleFileNameW (Address: 0x1005a020)
- GetModuleHandleExW (Address: 0x1005a01c)
api-ms-win-core-memory-l1-1-0.dll
- VirtualAlloc (Address: 0x1005a030)
- VirtualProtect (Address: 0x1005a034)
- VirtualQuery (Address: 0x1005a02c)
api-ms-win-core-processthreads-l1-1-0.dll
- GetCurrentProcess (Address: 0x1005a048)
- GetCurrentProcessId (Address: 0x1005a03c)
- SetThreadStackGuarantee (Address: 0x1005a040)
- TerminateProcess (Address: 0x1005a044)
api-ms-win-core-profile-l1-1-0.dll
- QueryPerformanceCounter (Address: 0x1005a050)
- QueryPerformanceFrequency (Address: 0x1005a054)
api-ms-win-core-registry-l1-1-0.dll
- RegCloseKey (Address: 0x1005a06c)
- RegEnumKeyExW (Address: 0x1005a060)
- RegOpenKeyExW (Address: 0x1005a05c)
- RegQueryInfoKeyW (Address: 0x1005a064)
- RegQueryValueExW (Address: 0x1005a068)
api-ms-win-core-synch-l1-1-0.dll
- DeleteCriticalSection (Address: 0x1005a07c)
- EnterCriticalSection (Address: 0x1005a074)
- InitializeCriticalSection (Address: 0x1005a080)
- LeaveCriticalSection (Address: 0x1005a078)
api-ms-win-core-sysinfo-l1-1-0.dll
- GetSystemInfo (Address: 0x1005a088)
api-ms-win-core-xstate-l2-1-0.dll
- GetEnabledXStateFeatures (Address: 0x1005a090)
api-ms-win-eventing-provider-l1-1-0.dll
- EventRegister (Address: 0x1005a0a4)
- EventSetInformation (Address: 0x1005a0a0)
- EventUnregister (Address: 0x1005a09c)
- EventWriteTransfer (Address: 0x1005a098)
ntdll.dll
- _alloca_probe (Address: 0x1005a10c)
- _vsnwprintf (Address: 0x1005a108)
- _wcsicmp (Address: 0x1005a100)
- EtwGetTraceEnableFlags (Address: 0x1005a0d8)
- EtwGetTraceEnableLevel (Address: 0x1005a0e8)
- EtwGetTraceLoggerHandle (Address: 0x1005a0e4)
- EtwRegisterTraceGuidsW (Address: 0x1005a0f8)
- EtwTraceMessage (Address: 0x1005a0dc)
- EtwUnregisterTraceGuids (Address: 0x1005a0e0)
- memcmp (Address: 0x1005a110)
- memcpy (Address: 0x1005a114)
- memmove (Address: 0x1005a0f0)
- memset (Address: 0x1005a118)
- NtClose (Address: 0x1005a0b8)
- NtOpenFile (Address: 0x1005a104)
- NtOpenKey (Address: 0x1005a0b4)
- NtQueryInformationProcess (Address: 0x1005a0c0)
- NtQueryValueKey (Address: 0x1005a0bc)
- NtTerminateProcess (Address: 0x1005a0fc)
- qsort (Address: 0x1005a0d0)
- RtlAllocateHeap (Address: 0x1005a0ac)
- RtlFreeHeap (Address: 0x1005a0b0)
- RtlGetCurrentProcessorNumberEx (Address: 0x1005a0c8)
- RtlImageNtHeader (Address: 0x1005a0cc)
- RtlInitUnicodeString (Address: 0x1005a0ec)
- RtlUnhandledExceptionFilter (Address: 0x1005a0f4)
- RtlUnwind (Address: 0x1005a0d4)
- wcscpy_s (Address: 0x1005a0c4)